{"id":"https://openalex.org/W2982381313","doi":"https://doi.org/10.1109/wcnc.2019.8885915","title":"An Efficient Handover Authentication Mechanism for 5G Wireless Network","display_name":"An Efficient Handover Authentication Mechanism for 5G Wireless Network","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2982381313","doi":"https://doi.org/10.1109/wcnc.2019.8885915","mag":"2982381313"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2019.8885915","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2019.8885915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056227346","display_name":"Kaihong Han","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaihong Han","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China","Tianjin Key Laboratory of Advanced Networking, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking, Tianjin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100451509","display_name":"Xiaohong Li","orcid":"https://orcid.org/0000-0002-0752-6764"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Li","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China","Tianjin Key Laboratory of Advanced Networking, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking, Tianjin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001714538","display_name":"Zhiyong Feng","orcid":"https://orcid.org/0000-0001-5322-222X"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyong Feng","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China","Tianjin Key Laboratory of Cognitive Computing and Application, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Cognitive Computing and Application, Tianjin, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047509839","display_name":"Jianye Hao","orcid":"https://orcid.org/0000-0002-0422-8235"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianye Hao","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China","Tianjin Key Laboratory of Cognitive Computing and Application, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Cognitive Computing and Application, Tianjin, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5056227346"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":3.0063,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.921945,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.8505591154098511},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.8310601711273193},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8182411789894104},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8010735511779785},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.703475832939148},{"id":"https://openalex.org/keywords/generic-bootstrapping-architecture","display_name":"Generic Bootstrapping Architecture","score":0.6726903915405273},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.6318846940994263},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.6244165301322937},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.5829636454582214},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.5532431602478027},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.536506175994873},{"id":"https://openalex.org/keywords/chip-authentication-program","display_name":"Chip Authentication Program","score":0.5151159167289734},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4565770626068115},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.4483918249607086},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.41547057032585144},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32397449016571045},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.27204781770706177},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12187913060188293},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.11687988042831421},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07559677958488464},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06716004014015198},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.06674450635910034}],"concepts":[{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.8505591154098511},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.8310601711273193},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8182411789894104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8010735511779785},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.703475832939148},{"id":"https://openalex.org/C174953433","wikidata":"https://www.wikidata.org/wiki/Q5532650","display_name":"Generic Bootstrapping Architecture","level":5,"score":0.6726903915405273},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.6318846940994263},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.6244165301322937},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.5829636454582214},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.5532431602478027},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.536506175994873},{"id":"https://openalex.org/C142124187","wikidata":"https://www.wikidata.org/wiki/Q5101471","display_name":"Chip Authentication Program","level":5,"score":0.5151159167289734},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4565770626068115},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4483918249607086},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.41547057032585144},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32397449016571045},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27204781770706177},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12187913060188293},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.11687988042831421},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07559677958488464},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06716004014015198},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.06674450635910034}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc.2019.8885915","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2019.8885915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W856480813","https://openalex.org/W1520955558","https://openalex.org/W2018356792","https://openalex.org/W2029090942","https://openalex.org/W2125560635","https://openalex.org/W2132544882","https://openalex.org/W2160272733","https://openalex.org/W2162325770","https://openalex.org/W2343448572","https://openalex.org/W2413749762","https://openalex.org/W2562510186","https://openalex.org/W2603810864","https://openalex.org/W2734444502","https://openalex.org/W2738286396","https://openalex.org/W2744523492","https://openalex.org/W2766716957","https://openalex.org/W2767391302","https://openalex.org/W2958921429","https://openalex.org/W2963634393","https://openalex.org/W6741103029"],"related_works":["https://openalex.org/W2017959161","https://openalex.org/W2390304521","https://openalex.org/W2148168515","https://openalex.org/W2161818407","https://openalex.org/W2129970007","https://openalex.org/W4253316174","https://openalex.org/W4324137616","https://openalex.org/W2117797620","https://openalex.org/W3022695109","https://openalex.org/W3021015816"],"abstract_inverted_index":{"In":[0],"an":[1],"ultra-dense":[2],"fifth-generation":[3],"(5G)":[4],"wireless":[5,45],"network,":[6],"the":[7,36,61,70,109,121,128,133,136],"deployment":[8],"of":[9,16,43,98,113,135],"dense":[10],"cells":[11],"with":[12],"a":[13,82,102],"large":[14],"number":[15],"base":[17],"stations":[18],"can":[19,126],"cause":[20],"frequent":[21],"handovers,":[22],"which":[23],"could":[24],"lead":[25],"to":[26,34,39,53,80],"higher":[27],"handover":[28,123,138],"delays":[29,130],"and":[30,75,101,116,131],"some":[31],"security":[32,92,134],"issues":[33],"make":[35],"network":[37],"difficult":[38],"meet":[40],"various":[41],"requirements":[42],"5G":[44],"networks.":[46],"To":[47,90],"target":[48],"this":[49,87],"problem,":[50],"we":[51,68],"propose":[52],"employ":[54],"Mobile":[55],"Edge":[56],"Computing":[57],"(MEC)":[58],"servers":[59],"into":[60],"traditional":[62],"authentication":[63,84,88,124,129,139],"architecture":[64],"for":[65,108],"re-authentication.":[66],"Moreover,":[67],"improve":[69],"existing":[71],"Extensible":[72],"Authentication":[73],"Protocol-Authentication":[74],"Key":[76],"Agreement":[77],"(EAP-AKA)":[78],"protocol":[79],"design":[81],"new":[83],"mechanism":[85,125],"over":[86],"architecture.":[89],"enhance":[91],"functionality,":[93],"pseudonyms":[94],"are":[95],"used":[96,107],"instead":[97],"permanent":[99],"names":[100],"one-way":[103],"hash":[104],"function":[105],"is":[106],"authentication.":[110],"The":[111],"results":[112],"formal":[114],"verification":[115],"performance":[117],"evaluation":[118],"show":[119],"that":[120],"proposed":[122,137],"reduce":[127],"ensuring":[132],"scheme.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
